Safety & Security

Articles

Trihedral's Chris Little share how SCADA applications compile critical process history for data-driven insights, cost control and infrastructure longevity
Smart logistics and wireless communication network
Just like device with a microprocessor, wireless sensors have the potential to be compromised
The implementation of robust authentication & authorization mechanisms is a fundamental step in protecting iacs from potential cyber threats and is integral to the overall cybersecurity strategy outlined by the iec 62443 standards.
There’s a fundamental shift in security philosophy that requires a change in mindset
Wildfire in Pacific Palisades, Los Angeles, January 8, 2025, towards Getty Center and Brentwood
Improvements to municipal water systems can help avoid a repeat of the Pacific Palisades and other Los Angeles-area fires
A Control Amplified podcast with Joe Weiss, managing partner, Applied Control Solutions Inc.
A 5-sided metal die with a shield and keyhole security symbol on each face of the die
Seven system integrators show how they provide clients in multiple process industries with suitable and successful cybersecurity protections
Electricity transmission towers with orange glowing wires the starry night sky
Key takeaways from the IEEE Summit 2025 and the need for future inclusion of cybersecurity considerations in engineering conferences for grid reliability.
Professional cybersecurity team working to prevent security threats, find vulnerability and solve incidents
The symposium will uncover real-world examples of control system cyber incidents and their physical impacts
Cybersecurity expert participants
Joe Weiss will moderate two sessions on bridging the cultural and operational divide between network security and engineering considerations.
rsa_blog
2025’s RSA Cybersecurity Conference focused on anything AI and the latest advanced persistent threats, while leaving out discussions about control system field device cybersecurity...
Defense planning involves the development of strategies, policies, and doctrines to address security challenges and achieve national defense objectives
Including process sensors as cyber assets will be a welcome step toward making NERC CIP requirements more relevant to grid safety threats
3d rendering energy storage system or battery container unit with blue sky background
In a follow-up article, Joe addresses a Sandia National Laboratory report on BESS cybersecurity